Linux PE

Check List of PE Vulnerabilities

Once you have access to a system there are a few basic things that you can check in order to do privilege escalation. The following is a list of items that you check

  1. Check whether the user is part of an admin group. Admin groups usually have access to backups, logs, etc

  2. Check whether the version of linux is susceptible to any attacks

  3. Does the tmp folder have any files or executables

  4. Are there any cron jobs that can be modified or manipulated

  5. Any suspicious process running that can be hijacked

  6. What are the list of editable files by the user

  7. Check the sudo list whether the user can execute any of those commands. This is helpful only when you have password to the user

  8. Are there any SUID binaries

  9. Does the root folder contain any files that are accessible by the user

  10. Are there any interesting files within the user's home directory

  11. Are there any loop back IP ports listening on that system

Other Resources

Last updated

Was this helpful?